语言类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
大学英语考试
大学英语考试
全国英语等级考试(PETS)
英语证书考试
英语翻译资格考试
全国职称英语等级考试
青少年及成人英语考试
小语种考试
汉语考试
大学英语六级CET6
大学英语三级A
大学英语三级B
大学英语四级CET4
大学英语六级CET6
专业英语四级TEM4
专业英语八级TEM8
全国大学生英语竞赛(NECCS)
硕士研究生英语学位考试
[此试题无题干]
进入题库练习
进入题库练习
To live in the United States today is to gain an appreciation for Dahrendorf's assertion that social change exists everywhere. Technology, the application of knowledge for practical ends, is a major source of social change. Yet we would do well to remind ourselves that technology is a human creation; it does not exist naturally. A spear or a robot is as much a cultural as a physical object. Until humans use a spear to hunt game or a robot to produce machine parts, neither is much more than a solid mass of matter. For a bird looking for an object on which to rest, a spear or robot serves the purpose equally well. The explosion of the Challenger space shuttle and the Russian nuclear accident at Chernobyl drive home the human quality of technology; they provide cases in which well-planned systems suddenly went haywire(变得混乱)and there was no ready hand to set them right. Since technology is a human creation, we are responsible for what is done with it. Pessimists worry that we will use our technology eventually to blow our world and ourselves to pieces. But they have been saying this for decades, and so far we have managed to survive and even flourish. Whether we will continue to do so in the years ahead remains uncertain. Clearly, the impact of technology on our lives deserves a closer examination. Few technological developments have had a greater impact on our lives than the computer revolution. Scientists and engineers have designed specialized machines that can do the tasks that once only people could do. There are those who assert that the switch to an information-based economy is in the same camp as other great historical milestones, particularly the Industrial Revolution. Yet when we ask why the Industrial Revolution was a revolution, we find that it was not the machines. The primary reason why it was a revolutionary is that it led to great social change. It gave rise to mass production and, through mass production, to a society in which wealth was not confined to the few. In somewhat similar fashion, computers promise to revolutionize the structure of American life, particularly as they free the human mind and open new possibilities in knowledge and communication. The Industrial Revolution supplemented and replaced the muscles of humans and animals by mechanical methods. The computer extends this development to supplement and replace some aspects of the mind of human beings by electronic methods. It is the capacity of the computer for solving problems and making decisions that represents its greatest potential and that poses the greatest difficulties in predicting the impact on society.
进入题库练习
创新型经济 (innovative economy)一种可持续、健康的经济,体现了节约资源的理念。创新型经济强调经济发展要靠知识、人才和创新,而不是依赖自然资源、劳动力和资本的投入。知识和人才是创新型经济最重要的要素,知识是创新的源泉,人才是创新的主体。目前中国经济的发展主要建立在资源消耗的基础上,因此应重视资源的节约和合理利用。只有从传统经济模式向创新型经济转变,才能促进经济的可持续发展。
进入题库练习
自从1978年市场化改革(market reforms)以来,中国经济已经逐渐从集中的计划经济向市场经济转变,中国经济和社会发展迅速。
进入题库练习
BSection A/B
进入题库练习
[此试题无题干]
进入题库练习
BSection B/B
进入题库练习
进入题库练习
老龄化社会(an aging society)是指老年人口占总人口达到或超过一定的比例的人口结构模型。按照联合国的传统标准是一个地区60岁以上的老人达到总人口的10%,新标准是65岁老人占总人口的7%,即该地区视为进入老龄化社会。老龄化的加速对经济社会都将产生巨大的压力。2009年10月26日,中国传统节日重阳节(the Double Ninth Festival)到来之际,中国正式启动了一项应对人口老龄化的战略研究,以积极应对持续加剧的人口老龄化危机。
进入题库练习
[此试题无题干]
进入题库练习
[此试题无题干]
进入题库练习
[此试题无题干]
进入题库练习
{{B}}Section BDirections: There are 2 passages in this section. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A, B, C and D. You should decide on the best choice.{{/B}}
进入题库练习
新能源汽车(new energy vehicle)是指采用非常规的车用燃料作为动力来源的汽车。近年来,政府高度关注新能源汽车的研发和产业化,形成了完整的新能源汽车研发和示范布局。我国的新能源汽车产销量逐年增长。发展新能源汽车可作为解决能源及环境问题、实现可持续发展的重要手段。目前,国家在新能源汽车方面给予了很大的政策和资金支持。国家决定免征新能源汽车购置税,这将进一步减轻消费者的购买负担,刺激私人购买新能源汽车。
进入题库练习
Reporting From the Web's Underbelly A)In the last year, Eastern European cybercriminals have stolen Brian Krebs's identity a half dozen times, brought down his website, sent heroin to his doorstep, and called a SWAT team to his home just as his mother was arriving for dinner. Mr. Krebs, 41, tries to write pieces that cannot be found elsewhere. His widely read cybersecurity blog, "Krebs on Security", covers a particularly dark corner of the Internet. He covers this niche with much the same perseverance of his subjects, earning him their respect and occasional angry. B)Mr. Krebs is so entrenched in the digital underground that he is on a first-name basis with some of Russia's major cybercriminals. Many call him regularly, leak him documents about their rivals, and try to bribe and threaten him to keep their names and dealings off his blog. His clean-cut looks and plain-speaking manner seem more appropriate for a real-estate broker than a man who spends most of his waking hours studying the Internet's underbelly. But few have done more to shed light on the digital underground than Mr. Krebs. C)His obsession with hackers kicked in when he was just another victim. In 2001, a computer worm locked him out of his home computer. He started looking into it. And he kept looking, learning about spam, computer worms and the underground industry behind it. Eventually, his anger and curiosity turned into a full-time beat at The Post and then on his own blog. D)Today, he maintains extensive files on criminal syndicates(联合会)and their tools. Some security experts readily acknowledge that he knows more about Russia's digital underground than they do. "I would put him up against the best threat intelligence analyst," said Rodney Joffe, senior vice president at Neustar, an Internet infrastructure firm. "Many of us in the industry go to him to help us understand what the Eastern European criminals are doing, how they work with each other and who is doing what to whom." That proved the case in December when Mr. Krebs uncovered what could be the biggest known Internet credit-card robbery. That month, he had been poking around private, underground forums where criminals were bragging about a fresh haul of credit and debit cards. E)Soon after, one of Mr. Krebs's banking sources called to report a high number of fraudulent purchases and asked whether Mr. Krebs could discover exactly where they were coming from. The source said that he had bought a large batch of stolen cards from an underground site and that they all appeared to have been used at Target. Mr. Krebs checked with a source at a second bank that had also been dealing with a narrow sharp point in fraud, Together, they visited one forum and bought a batch of stolen cards. Again, the cards appeared to have one thing in common: They had been used at Target from late November to mid-December. F)On the morning of Dec. 18, Mr. Krebs called Target. The company's spokeswoman did not return his call until several hours later, but by then he had enough to run his article: Criminals had breached the registers in Target's stores and had made off with tens of millions of payment card numbers. In the following weeks, Mr. Krebs discovered breaches at Neiman Marcus; Michaels, the arts and crafts retailer; and White Lodging, which manages franchises for major hotel chains like Hilton, Marriott and Starwood Hotels. It is still unclear whether the attacks were related, but at least 10 other retailers may have been hit by the same hackers that hit Target and are reluctant to acknowledge it. G)That is where Mr. Krebs comes in. Unlike physical crime—a bank robbery, for example, quickly becomes public—online thefts are hushed up by companies that worry the disclosure will inflict more damage than the theft, allowing hackers to raid multiple companies before consumers hear about it. Mr. Krebs is "doing the security industry an enormous favor by disseminating(宣传)real-time threat information," said Barmak Meftah, chief executive of Alien Vault, a threat-detection service. "We are only as strong as our information. Unless we are very specific and effective about exchanging threat data when one of us gets breached, we will always be a step behind the attackers." The account of victims from the breaches at Target, Neiman Marcus and others now exceeds one-third of the United States population—a grim factoid(趣味小新闻)that may offer Mr. Krebs a strange sense of career vindication(澄清). H)He first developed an interest in computers because his father, an Air Force engineer, was obsessed with the latest devices. But he did little about it until 1998, when he began writing about technology for The Post, after working his way up from the mailroom. Cybersecurity became a bit of a focus after his own computer was infected by that worm in 2001. I)In 2005, he started The Post's Security Fix blog, occasionally frustrating editors with hacker jargon and unnerving some who worried he was becoming too close to sources. By 2006, Mr. Krebs was a fixture in hacker forums, learning code, and—ever the dutiful reporter—borrowing Russian language tapes from his local library since most of what he tracks originates in the former Soviet Union and its satellite states. In 2009, The Post asked Mr. Krebs to broaden his focus to general technology news and policy. When he declined, he was let go. J)He used his severance(解职金)to start his own blog, Krebs on Security, from his "command centre," a guest room at the Annandale, Va., home he shares with his wife. There, three 19-inch computer screens help him keep tabs on the underworld, while another monitors security footage of his house. K)Mr. Krebs's readership is growing. In December, 850 000 readers visited his blog, mostly to learn more about the breach at Target. Though he will not disclose figures, Mr. Krebs says the salary he now makes from advertising, occasional speaking engagements and consulting work is a "nice bump" from what he earned at The Post. But there are risks implicit to being a one-man operation. "The work that he's done exposing Eastern European hackers has been seminal," said Tom Kellermann, vice president for cybersecurity at Trend Micro, a computer security company. "But Brian needs a bodyguard." L)Russian criminals routinely feed Mr. Krebs information about their rivals that they obtained through hacks. After that, he began receiving daily calls from a major Russian cybercriminal seeking his files back. Mr. Krebs is writing a book about the experience, called Spam Nation, to be published by Sourcebooks this year. M)In the meantime, hackers have been competing in a dangerous game of one-upmanship to see who can pull the worst trick on Mr. Krebs. They often steal his identity. One opened a $ 20 000 credit line in his name. Admirers have made more than $ 1 000 in bogus PayPal donations to his blog using hacked accounts. Others have paid his cable bill for three years with stolen credit cards. N)The antics(滑稽的动作)can be dangerous. In March, as Mr. Krebs was preparing to have his mother over for dinner, he opened his front door to find a police SWAT team pointing semiautomatic guns in his direction. Only after his wife returned home from the grocery store to find him handcuffed did the police realize Mr. Krebs had been the victim of "swatting." Someone had called the police and falsely reported a murder at their home. O)Mr. Krebs said he did plan to move and keep his new address secret. But these days it is almost impossible. Though he goes to great lengths to protect his personal information, last month his wife received an e-mail from Target informing her that their mailing address and other personal information had been stolen in the breach. "I got that letter," he said, "and I just had to laugh."
进入题库练习
[此试题无题干]
进入题库练习
[此试题无题干]
进入题库练习
“中国制造”指在中国制造的商品所附的标签。由于中国有丰富的劳动力资源和原材料资源等优势,中国制造的产品物美价廉,受到世界各国的欢迎。中国的制造业迅速发展,“中国制造”已经成为一个在全球广受认可的标签。目前中国已经成为世界制造业的中心,被称为“世界工厂”。尽管全球大量的电子产品和鞋都是中国制造。但这些产品的设计都是在欧美国家完成的。如今越来越多的中国公司致力于开创自己的品牌,希望实现从“中国制造”到“中国设计”的转变。
进入题库练习
[此试题无题干]
进入题库练习